Module 2: Foot printing and Reconnaissance

This module of the Certified Ethical Hacker (CEH) certification focuses on the crucial initial steps an attacker (or ethical hacker) takes to gather information about a target. This process is divided into two main parts:

  • Footprinting: This involves passively gathering information about the target without directly interacting with their systems. Think of it as reconnaissance from a distance.
  • Reconnaissance: This involves more active techniques that may involve some interaction with the target’s systems, though still generally in a non-intrusive manner.

Key Concepts Covered in this Module:

  • Footprinting Methodology: This includes various techniques like:
    • Using search engines: Advanced Google searches (Google dorking) to find sensitive information exposed online.
    • WHOIS lookups: Retrieving domain registration information to identify owners, contacts, and other details.
    • DNS interrogation: Gathering information about domain name servers, IP addresses, and subdomains.
    • Social media reconnaissance: Analyzing social media profiles of individuals and organizations to gather insights.
    • Website analysis: Examining website code, headers, and content to uncover technologies used and potential vulnerabilities.
  • Reconnaissance Techniques: This includes techniques like:
    • Network scanning: Using tools like Nmap to identify active hosts, open ports, and services running on a target network.
    • Tracerouting: Mapping the network path to a target to understand network infrastructure.
    • Social engineering: Manipulating individuals to divulge confidential information (though this is covered in more detail in later modules).
  • Footprinting and Reconnaissance Tools: The module covers various tools used for information gathering, such as:
    • WHOIS lookup tools
    • DNS analysis tools (e.g., nslookup, dig)
    • Network scanners (e.g., Nmap)
    • Website analysis tools (e.g., Nikto)
  • Countermeasures: The module also discusses countermeasures that organizations can implement to protect against footprinting and reconnaissance activities.

Why is Footprinting and Reconnaissance Important?

  • For Attackers: It helps them understand the target’s infrastructure, identify potential vulnerabilities, and plan their attack strategy.
  • For Ethical Hackers: It helps them assess the organization’s security posture, identify information leakage, and recommend appropriate security measures.
Scroll to Top